Holiday Turkey With A Side Of Scam

Holiday fishing trips take on a new meaning when scammers try to phish you instead. Between getting the turkey thawed and the potatoes mashed before your family arrives, cybersecurity is probably the last thing on your mind… creating the ideal environment for scammers to take advantage of an inattentive click on a link. With the prevalence of technology, we have become desensitized to the vigilant scrutiny necessary to avoid becoming part of the ever-growing populace of the scammed. (https://www.aarp.org/pri/topics/work-finances-retirement/fraud-consumer-protection/2022-holiday-shopping-scams-report.html) To keep your holidays full of merriment and free from fraud, keep these best practices in mind: Remember that scams can come in many forms, including phone calls, texts, and emails. Scrutinize the phone number, name, or email address. Do you know it? Are you expecting it? Does it pertain to something you're aware of (E.g., a purchase, vendor, meeting, etc.)? Before clicking on any links, mouse over them - does…

Comments Off on Holiday Turkey With A Side Of Scam

Keeping Your Gmail and iCloud Accounts Secure: A Guide to Spotting Suspicious Logins

One of the easiest ways for cybercriminals to compromise your information is by gaining unauthorized access to your email and cloud accounts. Both Gmail and iCloud are primary targets due to their widespread use and the plethora of information stored within them. At Critical Path Security, we're here to ensure that your data remains uncompromised. We recommend that all our clients regularly monitor their accounts for suspicious logins and ensure that two-factor authentication (2FA) is enabled. To help in this endeavor, we've simplified the process for you with a step-by-step guide for both Gmail and iCloud. Checking Gmail for Suspicious Logins: Login to Your Account: Visit Gmail and log in. Access Google Account: On the top-right corner, click on your profile picture and select "Manage your Google Account." Navigate to Security: From the left pane, select "Security." Review Recent Activity: Under the "Your devices" section, you can see the devices…

Comments Off on Keeping Your Gmail and iCloud Accounts Secure: A Guide to Spotting Suspicious Logins

Setting Up Password Policies in Active Directory: A Guide by Critical Path Security

Establishing a Strong Password Policy Protecting your network starts with a robust password policy. With Microsoft Active Directory, you can utilize Group Policy to dictate various password criteria like complexity, duration, and size. Locate the default domain password policy at: Group Policy object (GPO) -> Computer configuration -> Policies -> Windows Settings -> Security Settings -> Account Policies -> Password Policy. Since Windows Server 2008, you can implement detailed policies for specific organizational units through Active Directory Administrative Center (DSAC) or PowerShell. NIST's Password Recommendations The National Institute of Standards and Technology (NIST) provides Digital Identity Guidelines, which emphasize: Password Complexity and Length: Contrary to forcing numerous symbols, NIST suggests promoting lengthy passwords or passphrases, ideally up to 64 characters. Password Duration: Instead of regular password changes, NIST now advises changing passwords only if a security threat is perceived. Avoid Easily Guessable Passwords: Steer clear of simple patterns, default passwords,…

Comments Off on Setting Up Password Policies in Active Directory: A Guide by Critical Path Security

CISO Advisory Services: A Deeper Dive into the Selection Process Using the McKinsey 7-S Framework

At Critical Path Security, we recognize the pivotal role of the Chief Information Security Officer (CISO) in today's businesses. Our CISO advisory services are designed to provide the strategic oversight and cybersecurity expertise that companies require, without the need for a full-time commitment. This service is especially beneficial for organizations that may not have the resources to staff a full-time CISO but understand the importance of cybersecurity leadership. The Vital Role of a CISO In the realm of cybersecurity, a CISO is more than just a role-it's a necessity. This senior-level executive is responsible for shaping and steering an organization's strategy to protect its most valuable digital assets. At Critical Path Security, our focus is on providing a CISO's strategic oversight, including the establishment of cybersecurity policies, management of risk, and ensuring compliance with evolving regulations. Expansive Responsibilities of a CISO Our CISOs at Critical Path Security carry a broad…

0 Comments